Monitoring

The difference between Monitoring and Observability

Legacy methods based on handling predictable failures often do not work well while monitoring modern distributed applications. Efficient debugging and…

3 days ago

Frictionless Instrumentation with Lambda Layers

In many ways, serverless functions, like auto-scaling, pay-per-use, and reduced complexity, are great. When things go wrong and developers have…

4 weeks ago

Can We Have “Detection as Code”?

One more idea that has been bugging me for years is an idea of “detection as code.” Why is it…

3 months ago

Quarantine Monitoring: China Throws Privacy Out the Door

The world continues to reel from COVID-19, as the pandemic rages on. In China, government entities are explicitly stating they…

7 months ago

Why Data Security Matters to Business Agencies

The post Why Data Security Matters to Business Agencies appeared first on CCSI.

8 months ago

Managing Security and Privacy in the Public Cloud

As with any enterprise technology, there are benefits and challenges when creating IT environments in the public cloud. The benefits…

9 months ago

Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring

The post Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring appeared first on CCSI.

10 months ago

The Symbiotic, Parasitic Relationship Between Privacy, Security

Increasingly, at least in the law, privacy and security are diverging. There are cybersecurity lawyers who specialize in forensic investigations,…

10 months ago